Quantum Support Vector Regression for Robust Anomaly Detection Authors: Kilian Tscharke, Maximilian Wendlinger, Sebastian Issel, Pascal Debus | Published: 2025-05-02 | Updated: 2025-05-13 Certified RobustnessAnomaly Detection MethodRole of Quantum Machine Learning 2025.05.02 2025.05.28 Literature Database
Analysis of the vulnerability of machine learning regression models to adversarial attacks using data from 5G wireless networks Authors: Leonid Legashev, Artur Zhigalov, Denis Parfenov | Published: 2025-05-01 Backdoor AttackPoisoningAttack Type 2025.05.01 2025.05.27 Literature Database
LLM-Based Threat Detection and Prevention Framework for IoT Ecosystems Authors: Yazan Otoum, Arghavan Asad, Amiya Nayak | Published: 2025-05-01 | Updated: 2025-05-13 Bias Detection in AI OutputLLM Performance EvaluationPrompt Injection 2025.05.01 2025.05.27 Literature Database
An Empirical Study on the Effectiveness of Large Language Models for Binary Code Understanding Authors: Xiuwei Shang, Zhenkan Fu, Shaoyin Cheng, Guoqiang Chen, Gangyang Li, Li Hu, Weiming Zhang, Nenghai Yu | Published: 2025-04-30 Program AnalysisPrompt InjectionPrompt leaking 2025.04.30 2025.05.27 Literature Database
LASHED: LLMs And Static Hardware Analysis for Early Detection of RTL Bugs Authors: Baleegh Ahmad, Hammond Pearce, Ramesh Karri, Benjamin Tan | Published: 2025-04-30 Program AnalysisPrompt InjectionVulnerability detection 2025.04.30 2025.05.27 Literature Database
Bilateral Differentially Private Vertical Federated Boosted Decision Trees Authors: Bokang Zhang, Zhikun Zhang, Haodong Jiang, Yang Liu, Lihao Zheng, Yuxiao Zhou, Shuaiting Huang, Junfeng Wu | Published: 2025-04-30 Privacy Risk ManagementDifferential PrivacyWatermark Design 2025.04.30 2025.05.27 Literature Database
XBreaking: Explainable Artificial Intelligence for Jailbreaking LLMs Authors: Marco Arazzi, Vignesh Kumar Kembu, Antonino Nocera, Vinod P | Published: 2025-04-30 Disabling Safety Mechanisms of LLMPrompt InjectionExplanation Method 2025.04.30 2025.05.27 Literature Database
Hoist with His Own Petard: Inducing Guardrails to Facilitate Denial-of-Service Attacks on Retrieval-Augmented Generation of LLMs Authors: Pan Suo, Yu-Ming Shang, San-Chuan Guo, Xi Zhang | Published: 2025-04-30 LLM Performance EvaluationPoisoning attack on RAGAttack Type 2025.04.30 2025.05.27 Literature Database
Traceback of Poisoning Attacks to Retrieval-Augmented Generation Authors: Baolei Zhang, Haoran Xin, Minghong Fang, Zhuqing Liu, Biao Yi, Tong Li, Zheli Liu | Published: 2025-04-30 Poisoning attack on RAGAttack TypeDetection of Poisonous Data 2025.04.30 2025.05.27 Literature Database
Generative AI in Financial Institution: A Global Survey of Opportunities, Threats, and Regulation Authors: Bikash Saha, Nanda Rani, Sandeep Kumar Shukla | Published: 2025-04-30 Prompt leakingCompliance with Ethical GuidelinesGenerative AI in Financial Services 2025.04.30 2025.05.27 Literature Database